Apple Security Checklist Companion · 2016. 8. 15. · 4 Introduction Target Audience The Apple...

31
Apple Security Checklist Companion A practical guide for automating security standards in the Apple Enterprise with the Casper Suite June 2010

Transcript of Apple Security Checklist Companion · 2016. 8. 15. · 4 Introduction Target Audience The Apple...

  • Apple Security Checklist Companion

    A practical guide for automating security standardsin the Apple Enterprise with the Casper Suite

    June 2010

  • JAMF Software, LLC© 2010 JAMF Software, LLC. All Rights Reserved.

    JAMF Software has made all efforts to ensure that this guide is accurate.

    JAMF Software301 4th Ave S Suite 1075Minneapolis, MN 55415-1039(612) 605-6625

    JAMF Software, the JAMF Software logo, the Casper Suite, Casper Admin, Casper Imaging, Casper Remote, Casper VNC, Composer, the JAMF Software Server (JSS), JSS Mobile, JSS Set Up Utility, JAMFVNC, Recon and Recon for PC are all trademarks of JAMF Software, LLC registered in the US.

    Apple, the Apple logo, AirPort, AppleScript, AppleShare, AppleTalk, Bonjour, Boot Camp, ColorSync, Exposé, FileVault, FireWire, iCal, iChat, iMac, iSight, iTunes, Keychain, Leopard, Mac, Mac Book, Macintosh, Mac OS,QuickTime, Safari, Xgrid, Xsan, and Xserve are trademarks of Apple Inc., registered in the U.S. and other countries.

  • 3

    Contents

    Introduction 4 Target Audience 4 How to use this guide 4 Acknowledgements 5 Regulatory Compliance Frameworks 6 Useful Links on Security Concern

    ASC Guide 7 Installing Mac OS X 8 Protecting System Hardware 9 Securing Global System Settings 10 Securing Accounts 11 Securing System Preferences 13 Securing Data Using Encryption 14 Information Assurance with Applications 15 Information Assurance with Services 17 Advanced Security Management

    Appendix A 18 Meeting Sarbanes-Oxley Objectives 20 Role Based Administrator Access 21 Software Restriction 24 CasperVNC Security 25 Change Local Administrator Account Password 29 Enforce Screen Saver Settings 31 Protocol Security

  • 4

    Introduction

    Target Audience

    The Apple Security Checklist Companion (ASCC) is intended for IT practitioners engaged in governance, compliance and security related to Macintosh OS X computers.

    How to Use This Guide

    The ASCC is a companion document to be used in conjunction with Mac OS X Security Configuration Guide For Version 10.6 (Snow Leopard) published in May of 2010. Please download a copy from the link found below and become familiar with the security guidelines set forth by Apple with contributions made by the NSA, NIST and DISA.

    Using Apple’s guidelines as the authoritative source for security standards on Mac OS X, the ASCC provides you with an index of how to automate compliance with these standards using the Casper Suite.

    Acknowledgements

    JAMF Software would like to thank Apple Computer for not only publishing the security guide, but for the guidance they have provided regarding security on the platform. Additionally, we’d like to thank the security experts from our customer community for the insights that they have lent us as we have grown our understanding in this increasingly critical area for the Mac OS.

  • 5

    Regulatory Compliance Frameworks

    The increased need for security automation is driven by organizations looking to provide a more secure computing environment as well as being driven by regulatory mandates.

    For government institutions, the current iteration of the Federal Desktop Core Configuration (FDCC) does not include Mac OS computers. For those in the public sector, Sarbanes-Oxley requirements are not clearly articulated for Apple hardware, leaving the responsible system administrator at a loss for how to comply specifically when administering Apple hardware.

    This companion document follows the Apple guide in providing a “How to automate...” the What and the Why provided by Apple. As standards continue to emerge, this document will be updated to reflect the evolving landscape of security on Mac OS platform. Appendix A looks more in depth at Sarbanes-Oxley controls and supercedes the document titled “Security and Casper.”

  • 6

    Useful Links on Security Concerns

    Mac OS X Security Configuration Guides

    http://www.apple.com/support/security/guides/

    Mac OS X v10.6 (Snow Leopard)

    Mac OS X Security Configuration Guide

    Mac OS X Server Security Configuration Guide

    Mac OS X v10.5 (Leopard)

    Mac OS X Security Configuration GuideMac OS X Server Security Configuration Guide

    Mac OS X v10.4 (Tiger)

    Mac OS X Security Configuration GuideMac OS X Server Security Configuration Guide

    Mac OS X v10.3 (Panther)

    Client Security Configuration GuideServer Security Configuration Guide

    * There are additional links found within each of these guides. As a matter of practicality, this document is based on the Mac OS X v10.6 (Snow Leopard) security guide and the links found on pages 15 and 16 provide a wealth of information from Apple and US Government agencies and should be pursued as part of any inquiry into securing Mac OS client machines.

    http://www.apple.com/support/security/guides/http://images.apple.com/support/security/guides/docs/SnowLeopard_Security_Config_v10.6.pdfhttp://images.apple.com/support/security/guides/docs/SnowLeopard_Server_Security_Config_v10.6.pdfhttp://images.apple.com/support/security/guides/docs/SnowLeopard_Server_Security_Config_v10.6.pdfhttp://images.apple.com/server/macosx/docs/Leopard_Server_Security_Config_v10.5.pdfhttp://images.apple.com/server/macosx/docs/Tiger_Security_Config_021507.pdfhttp://images.apple.com/server/macosx/docs/Tiger_Server_Security_Config_021507.pdfhttp://images.apple.com/support/security/guides/docs/Panther_Security_Config.pdfhttp://images.apple.com/support/security/guides/docs/Panther_Server_Security_Config.pdf

  • 7

    Installing Mac OS X

    For hardening security on Mac OS X systems and maintaining that security Apple provides the Mac OS X Security Configuration guide as a source of instructions and recommendations. By using The Casper Suite your chosen security configuration can be implemented and maintained throughout the life cycle of your managed Macs. This document, which is based off of the Apple Security Checklist (ASC) that is included in the Mac OS X Security Configuration guide, details the deployable objects and the Casper Suite deployment mechanisms that can be used to implement Apple’s recommended security actions.

    Installation Action Items

    Action Item ASC Page

    Deployable Object Deployment Mechanism

    Securely erase the Mac OS X partition before installation

    31 Script Casper Imaging

    Install Mac OS X using Mac OS Extended disk formatting

    32 OS Image Casper Imaging

    Do not install unnecessary packages 31 OS Image Casper Imaging

    Do not transfer confidential information in Setup Assistant

    33 OS Image Casper Imaging

    Do not connect to the Internet 31 OS Image, Stand Alone JSS

    Casper Imaging and JSS on a secure network or FireWire drive

    Create administrator accounts with difficult-to-guess names

    34 Script, DMG Casper Imaging, Casper Remote, Policy

    Create complex passwords for administrator accounts

    34 N/A All Casper Suite products have support for complex passwords.

    Do not enter a password-related hint; instead, enter help desk contact information

    34 Script, Managed Preference

    Casper Remote, Policy

    Casper Remote, Policy 33, 91

    Script, DMG Casper Imaging, Casper Remote, Policy

    Enter correct time settings and set NTP time server

    35, 75

    Script, DMG, *Managed Preference

    Casper Imaging, Casper Remote, Policy, JSS

    Turn off Auto-login 35 OS Image, *Managed Preference

    Casper Imaging, JSS

    Use an internal Software Update server

    36 Setting, *Managed Preference

    JSS

    Update system software using verified packages

    38 Software Update Server PKG, DMG HTTP Downloads

    Casper Imaging, Casper Remote, Policy

    Repair disk permissions after installing software or software updates

    40 Setting Casper Imaging, Casper Remote, Policy

  • 8

    When hardening Mac OS X desktop systems after installation, protect your system hardware with the following:

    Action Items from ASC Page are managed by a Deployable Object using the appropriate Deployment Mechanism.

    Hardware Action Items

    Action Item ASC Page

    Deployable Object Deployment Mechanism

    Restrict access to rooms that have computers

    43 N/A N/A

    Store computers in locked or secure containers when not in use

    43 N/A N/A

    Disable Wi-Fi Support Software 45 Script-Complete Removal, *Managed Preference-Disable Only

    Casper Imaging, Casper Remote, Policy, Resource Kit

    Disable Bluetooth Support Software 46 Script, *Managed Preference (Disabled Only)

    Casper Imaging, Casper Remote, Policy, Resource Kit

    Disable Audio Recording Support Software

    48 Script Casper Imaging, Casper Remote, Policy

    Disable Video Recording Support Software

    49 Script Casper Imaging, Casper Remote, Policy

    Disable USB Support Software 51 Script Casper Imaging, Casper Remote, Policy, Resource Kit

    Disable FireWire Support Software 52 Script Casper Imaging, Casper Remote, Policy

    Protecting System Hardware

  • 9

    Securing Global System Settings

    When hardening Mac OS X desktop systems during installation, initialization or updating, reference the following:

    Action Items from ASC Page are managed by a Deployable Object using the appropriate Deployment Mechanism.

    Global System Action Items

    Action Item ASC Page

    Deployable Object Deployment Mechanism

    Require an EFI password 54 DMG, OS Image, Script Casper Imaging, Casper Remote, Policy

    Create an access warning for the login window

    57 DMG, OS Image, Script, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Create an access warning for the command line

    60 DMG, OS Image, Script Casper Imaging, Casper Remote, Policy

  • 10

    Securing Accounts

    When hardening Mac OS X desktop systems during installation, initialization or updating, reference the following:

    Action Items from ASC Page are managed by a Deployable Object using the appropriate Deployment Mechanism.

    System Preferences Action Items

    Action Item ASC Page

    Deployable Object Deployment Mechanism

    Log in with administrator privileges 63 N/A N/A

    Enable MobileMe only for user accounts without access to critical data

    64 Script, DMG, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Securely configure MobileMe preferences

    64 Script, DMG, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Securely configure Accounts preferences

    67 Script, DMG, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Securely configure Appearance preferences

    70 Script, DMG, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Change the number of recent items displayed

    71 Script, DMG, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Securely configure Appearance preferences

    72 Script, DMG Casper Imaging, Casper Remote, Policy

    Securely configure CD & DVD preferences

    73 Script, DMG, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Securely configure Date & Time preferences

    75 Script, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Securely configure Desktop & Screen Saver preferences

    77 Script, User Environment Package, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Securely configure Display preferences

    79 Script, Managed Preference

    Casper Imaging, Casper Remote, Policy

    Securely configure Dock preferences 79 Script, User Environment Package, Unix Command, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Securely configure Energy Saver preferences

    80 Script, Resource Kit, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Configure Exposé & Spaces Preferences

    83 Script, Unix Command Casper Imaging, Casper Remote, Policy

  • 11

    Securing System Preferences

    When hardening Mac OS X desktop systems during installation, initialization or updating, reference the following:

    Action Items from ASC Page are managed by a Deployable Object using the appropriate Deployment Mechanism.

    System Preferences Action Items

    Action Item ASC Page

    Deployable Object Deployment Mechanism

    Securely configure Keyboard 84 Script, Unix Command, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Securely configure Mouse preferences

    84 Script, Unix Command, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Securely configure Print & Fax preferences

    96 Script, User Environment Package

    Casper Imaging, Casper Remote, Policy

    Securely configure Network preferences

    85 Script, User Environment Package, Unix Command

    Casper Imaging, Casper Remote, Policy

    Securely configure Parental Control preferences

    93 DMG, Managed Preference

    Casper Imaging, Casper Remote, Policy

    Securely configure Security preferences

    99 Script, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Securely configure Sharing preferences

    105 Script, Managed Preference

    Casper Imaging, Casper Remote, Policy

    Securely configure Software Update preferences

    107 Script, Policy, JSS Setting, User Environment Package, Unix Command

    Casper Imaging, Casper Remote, Policy, JSS Setting

    Securely configure Sound preferences

    109 Script, User Environment Package

    Casper Imaging, Casper Remote, Policy

    Securely configure Speech preferences

    110 Script, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Securely configure Spotlight preferences

    111 Script, Unix Command Casper Imaging, Casper Remote, Policy

    Securely configure Startup Disk preferences

    114 Script, Unix Command Casper Imaging, Casper Remote, Policy

    Securely configure Time Machine preferences

    115 Script, Unix Command, *Managed Preference

    Casper Imaging, Casper Remote, Policy

  • 12

    Account Configuration Action Items

    Action Item ASC Page

    Deployable Object Deployment Mechanism

    Create an administrator account and a standard account for each administrator

    124 JSS Setting, QuickAdd, Script

    Casper Imaging, Casper Remote

    Create a standard or managed account for each nonadministrator

    124 QuickAdd, Script Casper Imaging, Casper Remote, Policy

    Set parental controls for managed accounts

    121 Script, DMG, Managed Preference

    Casper Imaging, Casper Remote, Policy

    Restrict sudo users to access required commands

    126 Script, DMG Casper Imaging, Casper Remote, Policy

    Securely configure LDAPv3 access 129 Script, DMG Casper Imaging, Casper Remote, Policy

    Securely configure Active Directory access

    129 Script, DMG Casper Imaging, Casper Remote, Policy

    Use Password Assistant to generate complex passwords

    130 Setting Casper Remote, Policy

    Authenticate using a smart card, token, or biometric device

    132 DMG Casper Imaging, Casper Remote, Policy

    Set a strong password policy 134 Script, Unix Command Casper Imaging, Casper Remote, Policy

    Secure the login keychain 135 Script, Unix Command Casper Imaging, Casper Remote, Policy

    Secure keychain items 137 Script, Unix Command Casper Imaging, Casper Remote, Policy

    Create keychains for specialized purposes

    136 Script, Unix Command Casper Imaging, Casper Remote, Policy

    Use a portable drive to store keychains

    139 DMG Casper Imaging, Casper Remote, Policy

  • 13

    Securing Data Using Encryption

    When hardening Mac OS X desktop systems during installation, initialization or updating, reference the following:

    Action Items from ASC Page are managed by a Deployable Object using the appropriate Deployment Mechanism.

    Encryption (DAR) Action Items

    Action Item ASC Page

    Deployable Object Deployment Mechanism

    Assign POSIX access permissions based on user categories

    144 Script, Unix Command, Composer Setting

    Casper Imaging, Casper Remote, Policy

    Review and modify folder flags 146 Script, Unix Command, Composer Setting

    Casper Imaging, Casper Remote, Policy

    Restrict permissions on User Home Folders

    152 Script, Unix Command Casper Imaging, Casper Remote, Policy

    Strip setuid bits from some programs 149 Script, Unix Command, Composer Setting

    Casper Imaging, Casper Remote, Policy

  • 14

    Information Assurance with Applications

    When hardening Mac OS X desktop systems during installation, initialization or updating, reference the following:

    Action Items from ASC Page are managed by a Deployable Object using the appropriate Deployment Mechanism.

    Application Configuration Action Items

    Action Item ASC Page

    Deployable Object Deployment Mechanism

    Configure Mail using SSL 166 Script, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Disable the Preview Pane for Mail Messages

    168 Script Apple recommends moving the separator bar to minimize the preview pane. Is this MCX-able?

    Disable Auto-Fill 175 DMG, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Block Pop-ups 176 DMG, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Only Allow Cookies from Visited Sites 177 DMG, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Disable opening safe files in Safari 177 DMG, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Verify certificate validity 171 Script Casper Imaging, Casper Remote, Policy

    Request MobileMe identity certificate 180 Script Casper Imaging, Casper Remote, Policy

    Secure iChat communications 178 Script, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Create a strong password for iTunes 181 N/A N/A

    Secure remote access using VPN 192 DMG, Script, *Managed Preference

    Casper Imaging, Casper Remote, Policy

    Turn firewall protection on 183 Script, Resource Kit, Managed Preference

    Casper Imaging, Casper Remote, Policy

  • 15

    Information Assurance with Services

    When hardening Mac OS X desktop systems during installation, initialization or updating, reference the following:

    Action Items from ASC Page are managed by a Deployable Object using the appropriate Deployment Mechanism.

    Services Action Items

    Action Item ASC Page

    Deployable Object Deployment Mechanism

    Configure IPFW2 firewall 187 OS Image, Package, Script

    Casper Imaging, Casper Remote, Policy

    Implement IPFW ruleset 189 OS Image, Package, Script

    Casper Imaging, Casper Remote, Policy

    Enable firewall logging 188, 103

    OS Image, Package, Script

    Casper Imaging, Casper Remote, Policy

    Implement inclusive ruleset 189 OS Image, Package, Script

    Casper Imaging, Casper Remote, Policy

    Set ruleset to permit services 190 OS Image, Package, Script

    Casper Imaging, Casper Remote, Policy

    Set more restrictive ruleset 190 OS Image, Package, Script

    Casper Imaging, Casper Remote, Policy

    Configuring System to load IPFW ruleset

    192 OS Image, Package, Script

    Casper Imaging, Casper Remote, Policy

    Bonjour 194 Script Casper Imaging, Casper Remote, Policy

    Secure BTMM access through Security Preferences (Back To My Mac)

    198 Script, User Environment Package, Managed Preference

    Casper Imaging, Casper Remote, Policy

    Set up screen sharing through VNC with password protection

    200 Script, DMG Casper Imaging, Casper Remote, Policy

    Disable Screen Sharing when possible

    200 OS Image, Script Casper Imaging, Casper Remote, Policy

    Disable File Sharing when possible 201 OS Image, Script Casper Imaging, Casper Remote, Policy

    Disable Printer Sharing when possible

    204 OS Image, Script Casper Imaging, Casper Remote, Policy

    Disable Scanner Sharing when possible

    204 OS Image, Script Casper Imaging, Casper Remote, Policy

    Disable Web Sharing when possible 204 OS Image, Script Casper Imaging, Casper Remote, Policy

    Disable Remote Login when possible 205 OS Image, Script Casper Imaging, Casper Remote, Policy

    Establish key-based SSH connections 207 Script Casper Imaging, Casper Remote, Policy

  • 16

    Services Action Items Cont.

    Action Item ASC Page

    Deployable Object Deployment Mechanism

    Configure ARD to manage remote tasks

    215 Script, Built In Feature Casper Imaging, Casper Remote, Policy

    Disable Remote Management when possible

    216 OS Image, Script Casper Imaging, Casper Remote, Policy

    Disable Remote Apple Events when possible

    216 OS Image, Script Casper Imaging, Casper Remote, Policy

    Disable Xgrid Sharing when possible 217 OS Image, Script Casper Imaging, Casper Remote, Policy

    Disable Internet Sharing when possible

    219 OS Image, Script Casper Imaging, Casper Remote, Policy

    Disable Bluetooth Sharing when possible

    220 OS Image, Script Casper Imaging, Casper Remote, Policy

  • 17

    Advanced Security Management

    When hardening Mac OS X desktop systems during installation, initialization or updating, reference the following:

    Action Items from ASC Page are managed by a Deployable Object using the appropriate Deployment Mechanism.

    Advance Management Action Items

    *Available as a template in the JSS

    Action Item ASC Page

    Deployable Object Deployment Mechanism

    Create an authorization right to the dictionary to authorize users

    225 Script, Managed Preference

    Casper Imaging, Casper Remote, Policy

    Create a digital signature 232 Script Casper Imaging, Casper Remote, Policy

    Enable security auditing 237 Script Casper Imaging, Casper Remote, Policy

    Configure security auditing 222, 238

    Script Casper Imaging, Casper Remote, Policy

    Generate auditing reports 222, 237

    Script Casper Imaging, Casper Remote, Policy

    Enable local logging 235 Script, Managed Preference

    Casper Imaging, Casper Remote, Policy

    Enable remote logging 220, 236

    Script, Managed Preference

    Casper Imaging, Casper Remote, Policy

    Install a file integrity checking tool 216, 232

    DMG Casper Imaging, Casper Remote, Policy

    Create a baseline configuration for file integrity checking

    216, 231

    OS Image N/A

    Install an antivirus tool 222, 239

    DMG Casper Imaging, Casper Remote, Policy

    Configure the antivirus tool to automatically download virus definition files

    222, 239

    DMG, Managed Preference

    Casper Imaging, Casper Remote, Policy

  • 18

    Appendix A - Meeting Sarbanes-Oxley Objectives

    There are seven Control Objectives that relate to desktop management under Sarbanes-Oxley requirements that are met through the Casper Suite.

    They are:

    • Grant the appropriate level of access in order to provide administrators functionality appropriate to their role.

    • Log the actions of each individual administrator.

    • Ensure that no illegal or unauthorized software can be run on corporate assets by excluding applications from execution.

    • Allow remote administrators to observe or control a computer in a way that is secure and audited.

    • Rapidly change access credentials for remote computers

    • Ensure that desktop screen savers activate after a set amount of time and require a password to unlock.

    • Ensure that data transmission is encrypted.

  • 19

    Appendix A - Meeting Sarbanes-Oxley Objectives

    While most system administrators governed by Sarbanes-Oxley are fluent in the terminology of the framework, a brief explanation of controls is provided below.

    Automated Controls are performed by computers and are binary in nature; they always function as designed and are not subject to intermittent error or human intervention.

    Access Controls define the appropriate access for different users and grant them rights and privileges to sensitive information.

    Control Objectives define the desired state and are used to measure the success or failure of a policy or procedure.

    Corrective Controls are aimed at restoring the system to its expected state.

    Detective Controls detect when an unwanted event occurs as a result of human factors as well as en vironmental and security issues; we need detective controls to alert us when an unwanted event transpires.

    Preventative Controls are aimed at avoiding unwanted situations.

  • 20

    Role Based Administrator Access

    Control Objectives

    • Grant the appropriate level of access in order to provide administrators functionality appropriate to their role.

    • Log the actions of each individual administrator.

    Within the Casper Suite, individuals can be added to the system to perform the tasks for which they are responsible (see fig. 1).

    fig. 1

  • 21

    Role Based Administrator Access

    These users can be added via LDAP and assigned appropriate privileges (see fig. 2).

    fig. 2

    Grant All Privileges Revoke All Privileges

    JSS - Home Tab Privileges

    Change Password

    JSS - Inventory Tab Privileges

    View Inventory Tab

    Perform Advanced Searches

    Save Advanced Searches

    View Saved Searches

    Add Computers Manually

    View Details on Inventory Items

    View License Serial Numbers

    Download Files Attached to Inventory Items

    View Computer Logs

    Edit Inventory Items

    Edit Autorun Data

    Delete Inventory Items

    JSS - Management Tab Privileges

    View Management Tab

    Manage Policies

    Manage PreStages

    Manage Restricted Software

    Manage Smart Computer Groups

    Manage Static Computer Groups

    Manage Management Preferences

    Manage Self Service Preferences

    Manage Scheduled Tasks

    Manage Directory Bindings

    Manage Distribution Points

    Manage Software Update Servers

    Manage NetBoot Servers

    JSS - Logs Tab Privileges

    View Logs Tab

    Flush Policy Histories

    JSS - Settings Tab Privileges

    View Settings Tab

    Manage JSS Accounts

    Manage LDAP Servers

    Manage Buildings and Departments

    Manage Network Segments

    Manage General JSS Settings

    View Database/Web Application Health

    Flush Database Logs

    Mass Edit Locations/Servers

    Mass Edit Warranties

    Mass Edit Autorun Data

    Mass Add SSH Accounts

    Mass Edit SSH Accounts

    JSS - Settings Tab Inventory Privileges

    Manage Inventory Preferences

    Manage Peripheral Types

    Manage Removable MAC Address

    Manage Custom Reports

    Manage Saved Searches

    Manage Licensed Software

    Manage Supressed Inventory Items

    Recon Privileges

    Add Hardware

    Add Computers Remotely

    QuickAdd Packages

    Casper Admin Privileges

    Use Casper Admin

    Save with Casper Admin

    Casper Imaging Privileges

    Use Casper Imaging

    Customize a Configuration

    Store Autorun Data

    Create Local Accounts

    Bind to Active Directory Locally

    Set Open Firmware Locally

    Modify Network Settings Locally

    Set ARD Fields Locally

    Use Advanced Options Locally

    Casper Remote Privileges

    Use Casper Remote

    Install/Uninstall Software Remotely

    Run Scripts Remotely

    Map Printers Remotely

    Add Dock Items Remotely

    Manage Local User Accounts Remotely

    Change Casper’s SSH Accounts Remotely

    Bind to Active Directory Remotely

    Set Open Firmware/EFI Passwords Remotely

    Reboot Computers Remotely

    Perform Maintenance Tasks Remotely

    Search for Files/Processes Remotely

    VNC Privileges

    Observe Remote Computers

    Observe Remote Computers Without Asking at Login Window

    Observe Remote Computers Without Asking

    Control Remote Computers

    Control Remote Computers Without Asking at Login Window

    Control Remote Computers Without Asking

  • 22

    Role Based Administrator Access

    When an individual administrator logs into any of the Casper Suite applications, his actions are logged in the database. The example provided below illustrates a sample log listing which users controlled a particular desktop computer (see fig. 3). Creating users and assigning their rights falls under Access Control; the logging of events allows for a Procedure that audits the veracity of the Control.

    fig. 3

  • 23

    Software Restriction

    Control Objectives

    • Ensure that no illegal or unauthorized software can be run on corporate assets by blacklisting applications.

    Ensuring that software that violates computer usage polices, such as Peer to Peer file sharing applications, are controlled requires the identification and removal of software that is out of scope, and notification about these activities to end user and management. In the case of software restriction (see fig. 4), the Casper Suite offers the following:

    • Detection of software by the process that loads into Random Access Memory (RAM), which is a Detective Control.

    • Quitting and removing the offending Application, which is a Preventative Control

    • Notification to end user and system administrators allows for a Procedure that enforces the Control.

    fig. 4

  • 24

    CasperVNC Security

    Control Objectives

    • Allow remote administrators to observe or control a computer in a way that is secure and audited.

    Casper VNC tunnels connections through SSL, which is an Access Control on data transmission from source to host. The VNC server is launched on demand when trying to control or observe a remote client, then quit when the administrator quits the Application. This Preventative Control ensures that only authorized Administrators can access machines during an active session and eliminates concerns about passive reception from intrusion.

    Every connection and all remote control, including VNC, are logged centrally in a database as illustrated in fig. 3 above.

    With the introduction of Version 6 of the Casper Suite, there is now the additional capability of sending all administrator actions to a CMDB/syslog server by specifying the directory, hostname and port of the server (see fig. 5).

    fig. 5

  • 25

    Change Local Administrator Account Password

    Control Objectives

    • Rapidly change Administrator account access on all computers.

    Utilizing the remote features in either the Casper Remote application (see fig. 6) or via a policy (see fig. 7,8,9) the password used to access the remote computers can be updated immediately for the computers that are online and will poll for missing computers until they are found. This Access Control ensures that any security breach involving a compromised administrator can be resolved within minutes.

    fig. 6

  • 26

    Change Local Administrator Account Password

    To change local administrator accounts via a policy, first determine the trigger (start up, login, logout, shut down, time of day, timed frequency, etc.), activation date and execution frequency.

    fig. 7

  • 27

    Change Local Administrator Account Password

    The next step is to assign computers or groups, in this case we are applying the policy to all computers.

    fig. 8

  • 28

    Change Local Administrator Account Password

    The last step is to set the command to reset the admin password. In this case we are resetting both the local admin account as well as the account used by the Casper Suite.

    fig. 9

  • 29

    Enforce Screen Saver Settings

    Control Objectives

    • Ensure that desktop screen savers activate after a set amount of time and require a password to unlock.

    The Composer application is used to extract system settings (plist entries) from a machine (see fig. 10) that has the proper time activation and security settings that enforces Access Control of the Operating System.

    fig. 10

  • 30

    Enforce Screen Saver Settings

    These settings can be remotely distributed to target machines (see fig. 11) and then reinforced on any system event or custom timing via a Policy or Managed Preference (see fig. 12). The Policy or Managed Preference is used to ensure that the Access Control is enforced in a reasonably persistent manner.

    fig. 11

    fig. 12

  • 31

    Protocol Security

    Control Objectives

    • Ensure that data transmission is encrypted.

    The central component of the Casper Suite, the JAMF Software Server (JSS), communicates with the other applications using industry standard SSL encryption that allows for a single point of management.

    The Increasing Importance of IT ‘Controls’ http://itmanagement.earthweb.com/netsys/article.php/3402561 September 1, 2004 By George Spafford

    IT Control Objectives for Sarbanes-Oxley: The Role of IT in the Design and Implementation of Internal Control Over Financial Reporting, 2nd Edition IT Governance Institute 3701 Algonquin Road, Suite 1010 Rolling Meadows, IL 60008 USA

    While this list addresses many of the primary Controls that Sarbanes-Oxley governs concerning Desktop Management, it is by no means exhaustive. In the absence of clear definitions or standards of conduct, the above solutions meet specific objectives that demonstrate a company’s willingness to abide by the spirit of the law.

    http://itmanagement.earthweb.com/netsys/article.php/3402561